Discover Performance

HP Software's community for IT leaders // July 2013
Subscribe

Overview

Defense in 5 stages: Understanding the kill chain

If you’re putting all your efforts into keeping bad guys out, you’ve only covered stage one.

Killer security

Trend watch

An X-ray of the SEA

HP Security Research assesses the Syrian Electronic Army and how to protect your enterprise against such adversaries.

Cutting-edge foes

In depth

Rate your IT against the best

The HP leader who surveyed 650 companies tells us what CIOs can learn from the best in the field.

Stand tall

CIO insight

Threat to your share price

Security Video

Jay Huff and other HP security execs discuss the impact to brand and the reputational damage of a breach—especially with the legal obligation to declare any breach.

Watch now

x

IT leader assessment

This tool evaluates the correlation between IT attributes and business success and, based on how your answers compare with average scores, will advise you where to invest in IT.

It is based on data HP collected from 650 global companies about a range of IT characteristics (server capacities, approach to information management, security, BYOD, etc.) and how they correlate to revenue gain. This assessment will compare your answers to the average scores in that study.

There are 12 questions that will require an estimated 10 minutes of your time. You'll receive a summary of your rating upon completion.



Let's get started
x

Please select an answer.
x

Analysis:

Your answer:
Your score:
Average score:
Revenue leaders' score:


x

Please select an answer.


x

Results

Your score:
Average score:
Revenue leaders' score:


Get detailed results:

Subscribe

Popular tags

Most read articles

Discover Performance

Archive

Enterprise 20/20

Security 20/20

Preparing today for tomorrow’s threats.

Introduction to Enterprise 20/20

What will a successful enterprise look like in the future?

CIO 20/20

Challenges and opportunities for the CIO of the future.

Dev Center 20/20

How will we organize development centers for the apps that will power our enterprises?

Marketing 20/20

Welcome to a new reality of split-second decisions and marketing by the numbers.

IT Operations 20/20

How can you achieve the data center of the future?

Employee 20/20

What the workforce of 2020 can expect from IT, and what IT can expect from the workforce.

Mobility 20/20

Looking toward the era when everyone — and everything — is connected.

Data Center 20/20

The innovation and revenue engine of the enterprise.

Read more

Events

Ponemon’s 2014 Cost of Cyber Crime study

Security analyst Larry Ponemon discusses his 2014 findings in a series of region-specific webinars covering Europe, the Americas and Asia.

HP Discover 2014

Join thousands of IT execs, engineers, and solution experts to explore IT trends, strategies, and best practices. (Barcelona,
Dec. 2–4)

Discover Performance Weekly

HP Software’s Paul Muller hosts a weekly video digging into the hottest IT issues. Check out the latest episodes.

Security index

28

The percentage of IT organizations that expect all critical apps and operations will be sourced via the cloud by 2016. (Three percent say that’s the case now. An additional 27% expect to get there by 2020.)1

2016

Year by which public cloud infrastructure will be required by the United States to comply with critical national infrastructure regulations. 2

10

Percentage of overall IT security enterprise product capabilities that will be delivered in the cloud by 2015.2

1“Hunting and Harvesting in a Digital World: The 2013 CIO Agenda,” Gartner, Mark P. McDonald and Dave Aron,
January 2013
2Predicts 2013: Security Solutions,” Gartner Inc., January 2013

One question

Q:  How do we prepare for an all-but-inevitable security breach?

A: The smart CISO starts with assessing the state of the business. … “What are we protecting?” The key is to get your business leaders, the people who run and understand the business itself, to answer that question. ... Coca-Cola has the secret formula … Everyone has something they need to protect. Keep in mind that you have to limit the answer to critical things. There is absolutely no feasible way to defend everything in the organization.

—Rafal Los, Principal, HP Enterprise Security Services, on his Wh1t3 Rabbit blog

HP Security Research blog

Tweets @ HPSecurity